CVE-2015-1606

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:24

Type Values Removed Values Added
References
  • {'url': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648', 'name': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 -

Information

Published : 2019-11-20 19:15

Updated : 2023-12-10 13:13


NVD link : CVE-2015-1606

Mitre link : CVE-2015-1606

CVE.ORG link : CVE-2015-1606


JSON object : View

Products Affected

debian

  • debian_linux

gnupg

  • gnupg
CWE
CWE-416

Use After Free